Security of Computer Operations
As computer operations become more diverse, distributed and complex the varieties of threats have increased. Although the more technical security breaches may now often be generated many miles from the main computer installation, using communications technology, they are still likely to be directed at data or software held and processed in the centre, and their chance of success will depend on the level of control over the computer installation.
KeywordsComputer Operation Preventive Maintenance Operating Instruction Data Control Group Maintenance Contract
Unable to display preview. Download preview PDF.